Sciweavers

909 search results - page 120 / 182
» Temporal Logic Case Study
Sort
View
JSC
2010
106views more  JSC 2010»
13 years 8 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
DOLAP
2010
ACM
13 years 7 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
WISE
2002
Springer
14 years 2 months ago
Fuzzy Cognitive Agents for Personalized Recommendation
There is an increasing need for various web-service, e-commerce and e-business sites to provide personalized recommendations to on-line customers. This paper proposes a new type o...
Chunyan Miao, Qiang Yang, Haijing Fang, Angela Goh
CSREAESA
2009
13 years 10 months ago
Embedded Processor Based Fault Injection and SEU Emulation for FPGAs
Two embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip...
Bradley F. Dutton, Mustafa Ali, Charles E. Stroud,...
KBS
2007
106views more  KBS 2007»
13 years 9 months ago
A cognitive approach for agent-based personalized recommendation
There is an increasing need for various e-service, e-commerce and e-business sites to provide personalized recommendations to on-line customers. This paper proposes a new type of ...
Chunyan Miao, Qiang Yang, Haijing Fang, Angela Goh